2019-01-25 18:23:51 +01:00
|
|
|
use std::process::exit;
|
|
|
|
use std::sync::RwLock;
|
|
|
|
|
2019-02-02 01:09:21 +01:00
|
|
|
use crate::error::Error;
|
2019-02-04 01:37:25 +01:00
|
|
|
use crate::util::get_env;
|
2019-02-02 01:09:21 +01:00
|
|
|
|
2019-01-25 18:23:51 +01:00
|
|
|
lazy_static! {
|
2019-02-02 01:09:21 +01:00
|
|
|
pub static ref CONFIG: Config = Config::load().unwrap_or_else(|e| {
|
|
|
|
println!("Error loading config:\n\t{:?}\n", e);
|
|
|
|
exit(12)
|
|
|
|
});
|
2019-02-08 18:45:07 +01:00
|
|
|
pub static ref CONFIG_FILE: String = get_env("CONFIG_FILE").unwrap_or_else(|| "data/config.json".into());
|
2019-01-25 18:23:51 +01:00
|
|
|
}
|
|
|
|
|
2019-02-08 20:49:04 +01:00
|
|
|
pub type Pass = String;
|
|
|
|
|
2019-01-25 18:23:51 +01:00
|
|
|
macro_rules! make_config {
|
2019-02-06 17:32:13 +01:00
|
|
|
($(
|
|
|
|
$(#[doc = $groupdoc:literal])?
|
|
|
|
$group:ident $(: $group_enabled:ident)? {
|
2019-02-05 22:17:02 +01:00
|
|
|
$(
|
2019-02-06 17:32:13 +01:00
|
|
|
$(#[doc = $doc:literal])+
|
|
|
|
$name:ident : $ty:ty, $editable:literal, $none_action:ident $(, $default:expr)?;
|
|
|
|
)+},
|
|
|
|
)+) => {
|
2019-02-02 01:09:21 +01:00
|
|
|
pub struct Config { inner: RwLock<Inner> }
|
2019-01-25 18:23:51 +01:00
|
|
|
|
2019-02-02 01:09:21 +01:00
|
|
|
struct Inner {
|
|
|
|
templates: Handlebars,
|
2019-02-02 16:47:27 +01:00
|
|
|
config: ConfigItems,
|
2019-02-03 00:22:18 +01:00
|
|
|
|
|
|
|
_env: ConfigBuilder,
|
|
|
|
_usr: ConfigBuilder,
|
2019-01-25 18:23:51 +01:00
|
|
|
}
|
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
#[derive(Debug, Clone, Default, Deserialize, Serialize)]
|
2019-02-02 16:47:27 +01:00
|
|
|
pub struct ConfigBuilder {
|
2019-02-05 22:17:02 +01:00
|
|
|
$($(
|
2019-02-03 00:22:18 +01:00
|
|
|
#[serde(skip_serializing_if = "Option::is_none")]
|
2019-02-05 22:17:02 +01:00
|
|
|
$name: Option<$ty>,
|
|
|
|
)+)+
|
2019-02-02 16:47:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
impl ConfigBuilder {
|
|
|
|
fn from_env() -> Self {
|
2019-02-06 14:54:39 +01:00
|
|
|
dotenv::from_path(".env").ok();
|
2019-02-02 16:47:27 +01:00
|
|
|
|
|
|
|
let mut builder = ConfigBuilder::default();
|
2019-02-05 22:17:02 +01:00
|
|
|
$($(
|
2019-02-03 00:22:18 +01:00
|
|
|
builder.$name = get_env(&stringify!($name).to_uppercase());
|
2019-02-05 22:17:02 +01:00
|
|
|
)+)+
|
2019-02-02 16:47:27 +01:00
|
|
|
|
|
|
|
builder
|
|
|
|
}
|
|
|
|
|
|
|
|
fn from_file(path: &str) -> Result<Self, Error> {
|
|
|
|
use crate::util::read_file_string;
|
|
|
|
let config_str = read_file_string(path)?;
|
|
|
|
serde_json::from_str(&config_str).map_err(Into::into)
|
|
|
|
}
|
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
/// Merges the values of both builders into a new builder.
|
|
|
|
/// If both have the same element, `other` wins.
|
|
|
|
fn merge(&self, other: &Self) -> Self {
|
2019-02-20 20:59:37 +01:00
|
|
|
let mut overrides = Vec::new();
|
2019-02-03 00:22:18 +01:00
|
|
|
let mut builder = self.clone();
|
2019-02-05 22:17:02 +01:00
|
|
|
$($(
|
2019-02-03 00:22:18 +01:00
|
|
|
if let v @Some(_) = &other.$name {
|
|
|
|
builder.$name = v.clone();
|
2019-02-20 20:59:37 +01:00
|
|
|
|
|
|
|
if self.$name.is_some() {
|
|
|
|
overrides.push(stringify!($name).to_uppercase());
|
|
|
|
}
|
2019-02-02 16:47:27 +01:00
|
|
|
}
|
2019-02-05 22:17:02 +01:00
|
|
|
)+)+
|
2019-02-20 20:59:37 +01:00
|
|
|
|
|
|
|
if !overrides.is_empty() {
|
|
|
|
// We can't use warn! here because logging isn't setup yet.
|
|
|
|
println!("[WARNING] The following environment variables are being overriden by the config file,");
|
|
|
|
println!("[WARNING] please use the admin panel to make changes to them:");
|
|
|
|
println!("[WARNING] {}\n", overrides.join(", "));
|
|
|
|
}
|
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
builder
|
2019-02-02 16:47:27 +01:00
|
|
|
}
|
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
/// Returns a new builder with all the elements from self,
|
|
|
|
/// except those that are equal in both sides
|
2019-02-08 18:45:07 +01:00
|
|
|
fn _remove(&self, other: &Self) -> Self {
|
2019-02-03 00:22:18 +01:00
|
|
|
let mut builder = ConfigBuilder::default();
|
2019-02-05 22:17:02 +01:00
|
|
|
$($(
|
2019-02-03 00:22:18 +01:00
|
|
|
if &self.$name != &other.$name {
|
|
|
|
builder.$name = self.$name.clone();
|
|
|
|
}
|
|
|
|
|
2019-02-05 22:17:02 +01:00
|
|
|
)+)+
|
2019-02-03 00:22:18 +01:00
|
|
|
builder
|
|
|
|
}
|
|
|
|
|
|
|
|
fn build(&self) -> ConfigItems {
|
2019-02-02 16:47:27 +01:00
|
|
|
let mut config = ConfigItems::default();
|
|
|
|
let _domain_set = self.domain.is_some();
|
2019-02-05 22:17:02 +01:00
|
|
|
$($(
|
2019-02-03 00:22:18 +01:00
|
|
|
config.$name = make_config!{ @build self.$name.clone(), &config, $none_action, $($default)? };
|
2019-02-05 22:17:02 +01:00
|
|
|
)+)+
|
2019-02-02 16:47:27 +01:00
|
|
|
config.domain_set = _domain_set;
|
|
|
|
|
|
|
|
config
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
#[derive(Debug, Clone, Default)]
|
2019-02-05 22:17:02 +01:00
|
|
|
pub struct ConfigItems { $($(pub $name: make_config!{@type $ty, $none_action}, )+)+ }
|
2019-02-02 01:09:21 +01:00
|
|
|
|
|
|
|
#[allow(unused)]
|
|
|
|
impl Config {
|
2019-02-05 22:17:02 +01:00
|
|
|
$($(
|
2019-02-03 00:22:18 +01:00
|
|
|
pub fn $name(&self) -> make_config!{@type $ty, $none_action} {
|
2019-02-02 01:09:21 +01:00
|
|
|
self.inner.read().unwrap().config.$name.clone()
|
|
|
|
}
|
2019-02-05 22:17:02 +01:00
|
|
|
)+)+
|
2019-02-02 01:09:21 +01:00
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
pub fn prepare_json(&self) -> serde_json::Value {
|
2019-02-05 22:17:02 +01:00
|
|
|
let (def, cfg) = {
|
2019-02-03 00:22:18 +01:00
|
|
|
let inner = &self.inner.read().unwrap();
|
2019-02-05 22:17:02 +01:00
|
|
|
(inner._env.build(), inner.config.clone())
|
2019-02-03 00:22:18 +01:00
|
|
|
};
|
|
|
|
|
2019-01-25 18:23:51 +01:00
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
fn _get_form_type(rust_type: &str) -> &'static str {
|
|
|
|
match rust_type {
|
2019-02-08 20:49:04 +01:00
|
|
|
"Pass" => "password",
|
2019-02-03 00:22:18 +01:00
|
|
|
"String" => "text",
|
|
|
|
"bool" => "checkbox",
|
|
|
|
_ => "number"
|
|
|
|
}
|
|
|
|
}
|
2019-02-02 16:47:27 +01:00
|
|
|
|
2019-02-04 01:37:25 +01:00
|
|
|
fn _get_doc(doc: &str) -> serde_json::Value {
|
|
|
|
let mut split = doc.split("|>").map(str::trim);
|
|
|
|
json!({
|
|
|
|
"name": split.next(),
|
|
|
|
"description": split.next()
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-02-05 22:17:02 +01:00
|
|
|
json!([ $({
|
|
|
|
"group": stringify!($group),
|
2019-02-06 00:38:57 +01:00
|
|
|
"grouptoggle": stringify!($($group_enabled)?),
|
2019-02-05 22:17:02 +01:00
|
|
|
"groupdoc": make_config!{ @show $($groupdoc)? },
|
|
|
|
"elements": [
|
|
|
|
$( {
|
|
|
|
"editable": $editable,
|
|
|
|
"name": stringify!($name),
|
|
|
|
"value": cfg.$name,
|
|
|
|
"default": def.$name,
|
|
|
|
"type": _get_form_type(stringify!($ty)),
|
|
|
|
"doc": _get_doc(concat!($($doc),+)),
|
|
|
|
}, )+
|
|
|
|
]}, )+ ])
|
2019-02-03 00:22:18 +01:00
|
|
|
}
|
2019-02-02 16:47:27 +01:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-02-05 22:17:02 +01:00
|
|
|
// Group or empty string
|
|
|
|
( @show ) => { "" };
|
2019-02-06 00:38:57 +01:00
|
|
|
( @show $lit:literal ) => { $lit };
|
2019-02-05 22:17:02 +01:00
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
// Wrap the optionals in an Option type
|
|
|
|
( @type $ty:ty, option) => { Option<$ty> };
|
|
|
|
( @type $ty:ty, $id:ident) => { $ty };
|
|
|
|
|
|
|
|
// Generate the values depending on none_action
|
|
|
|
( @build $value:expr, $config:expr, option, ) => { $value };
|
|
|
|
( @build $value:expr, $config:expr, def, $default:expr ) => { $value.unwrap_or($default) };
|
|
|
|
( @build $value:expr, $config:expr, auto, $default_fn:expr ) => {{
|
2019-02-02 16:47:27 +01:00
|
|
|
match $value {
|
2019-02-02 01:09:21 +01:00
|
|
|
Some(v) => v,
|
|
|
|
None => {
|
2019-02-02 16:47:27 +01:00
|
|
|
let f: &Fn(&ConfigItems) -> _ = &$default_fn;
|
|
|
|
f($config)
|
2019-02-02 01:09:21 +01:00
|
|
|
}
|
|
|
|
}
|
2019-02-03 00:22:18 +01:00
|
|
|
}};
|
2019-02-02 01:09:21 +01:00
|
|
|
}
|
2019-01-25 18:23:51 +01:00
|
|
|
|
2019-02-04 01:37:25 +01:00
|
|
|
//STRUCTURE:
|
2019-02-05 22:17:02 +01:00
|
|
|
// /// Short description (without this they won't appear on the list)
|
|
|
|
// group {
|
|
|
|
// /// Friendly Name |> Description (Optional)
|
|
|
|
// name: type, is_editable, none_action, <default_value (Optional)>
|
|
|
|
// }
|
2019-02-04 01:37:25 +01:00
|
|
|
//
|
2019-02-03 00:22:18 +01:00
|
|
|
// Where none_action applied when the value wasn't provided and can be:
|
|
|
|
// def: Use a default value
|
|
|
|
// auto: Value is auto generated based on other values
|
|
|
|
// option: Value is optional
|
2019-02-02 01:09:21 +01:00
|
|
|
make_config! {
|
2019-02-05 22:17:02 +01:00
|
|
|
folders {
|
|
|
|
/// Data folder |> Main data folder
|
|
|
|
data_folder: String, false, def, "data".to_string();
|
|
|
|
|
|
|
|
/// Database URL
|
|
|
|
database_url: String, false, auto, |c| format!("{}/{}", c.data_folder, "db.sqlite3");
|
|
|
|
/// Icon chache folder
|
|
|
|
icon_cache_folder: String, false, auto, |c| format!("{}/{}", c.data_folder, "icon_cache");
|
|
|
|
/// Attachments folder
|
|
|
|
attachments_folder: String, false, auto, |c| format!("{}/{}", c.data_folder, "attachments");
|
|
|
|
/// Templates folder
|
|
|
|
templates_folder: String, false, auto, |c| format!("{}/{}", c.data_folder, "templates");
|
|
|
|
/// Session JWT key
|
|
|
|
rsa_key_filename: String, false, auto, |c| format!("{}/{}", c.data_folder, "rsa_key");
|
|
|
|
/// Web vault folder
|
|
|
|
web_vault_folder: String, false, def, "web-vault/".to_string();
|
2019-02-06 17:32:13 +01:00
|
|
|
},
|
2019-02-05 22:17:02 +01:00
|
|
|
ws {
|
|
|
|
/// Enable websocket notifications
|
|
|
|
websocket_enabled: bool, false, def, false;
|
|
|
|
/// Websocket address
|
|
|
|
websocket_address: String, false, def, "0.0.0.0".to_string();
|
|
|
|
/// Websocket port
|
|
|
|
websocket_port: u16, false, def, 3012;
|
|
|
|
},
|
2019-02-06 17:32:13 +01:00
|
|
|
|
2019-02-05 22:17:02 +01:00
|
|
|
/// General settings
|
|
|
|
settings {
|
2019-03-03 16:09:15 +01:00
|
|
|
/// Domain URL |> This needs to be set to the URL used to access the server, including 'http[s]://'
|
|
|
|
/// and port, if it's different than the default. Some server functions don't work correctly without this value
|
2019-02-05 22:17:02 +01:00
|
|
|
domain: String, true, def, "http://localhost".to_string();
|
2019-02-18 19:25:33 +01:00
|
|
|
/// Domain Set |> Indicates if the domain is set by the admin. Otherwise the default will be used.
|
2019-02-05 22:17:02 +01:00
|
|
|
domain_set: bool, false, def, false;
|
|
|
|
/// Enable web vault
|
|
|
|
web_vault_enabled: bool, false, def, true;
|
|
|
|
|
2019-03-03 16:09:15 +01:00
|
|
|
/// Disable icon downloads |> Set to true to disable icon downloading, this would still serve icons from
|
|
|
|
/// $ICON_CACHE_FOLDER, but it won't produce any external network request. Needs to set $ICON_CACHE_TTL to 0,
|
2019-02-05 22:17:02 +01:00
|
|
|
/// otherwise it will delete them and they won't be downloaded again.
|
|
|
|
disable_icon_download: bool, true, def, false;
|
|
|
|
/// Allow new signups |> Controls if new users can register. Note that while this is disabled, users could still be invited
|
|
|
|
signups_allowed: bool, true, def, true;
|
|
|
|
/// Allow invitations |> Controls whether users can be invited by organization admins, even when signups are disabled
|
|
|
|
invitations_allowed: bool, true, def, true;
|
2019-03-03 16:09:15 +01:00
|
|
|
/// Password iterations |> Number of server-side passwords hashing iterations.
|
|
|
|
/// The changes only apply when a user changes their password. Not recommended to lower the value
|
2019-02-05 22:17:02 +01:00
|
|
|
password_iterations: i32, true, def, 100_000;
|
2019-03-03 16:09:15 +01:00
|
|
|
/// Show password hints |> Controls if the password hint should be shown directly in the web page.
|
|
|
|
/// Otherwise, if email is disabled, there is no way to see the password hint
|
2019-02-05 22:17:02 +01:00
|
|
|
show_password_hint: bool, true, def, true;
|
|
|
|
|
|
|
|
/// Admin page token |> The token used to authenticate in this very same page. Changing it here won't deauthorize the current session
|
2019-02-08 20:49:04 +01:00
|
|
|
admin_token: Pass, true, option;
|
2019-02-05 22:17:02 +01:00
|
|
|
},
|
|
|
|
|
|
|
|
/// Advanced settings
|
2019-02-06 17:32:13 +01:00
|
|
|
advanced {
|
2019-02-05 22:17:02 +01:00
|
|
|
/// Positive icon cache expiry |> Number of seconds to consider that an already cached icon is fresh. After this period, the icon will be redownloaded
|
|
|
|
icon_cache_ttl: u64, true, def, 2_592_000;
|
|
|
|
/// Negative icon cache expiry |> Number of seconds before trying to download an icon that failed again.
|
|
|
|
icon_cache_negttl: u64, true, def, 259_200;
|
2019-02-12 21:56:28 +01:00
|
|
|
/// Icon download timeout |> Number of seconds when to stop attempting to download an icon.
|
2019-03-03 16:09:15 +01:00
|
|
|
icon_download_timeout: u64, true, def, 10;
|
2019-03-18 22:12:39 +01:00
|
|
|
/// Icon blacklist Regex |> Any domains or IPs that match this regex won't be fetched by the icon service.
|
|
|
|
/// Useful to hide other servers in the local network. Check the WIKI for more details
|
|
|
|
icon_blacklist_regex: String, true, option;
|
2019-02-05 22:17:02 +01:00
|
|
|
|
2019-03-03 16:09:15 +01:00
|
|
|
/// Disable Two-Factor remember |> Enabling this would force the users to use a second factor to login every time.
|
|
|
|
/// Note that the checkbox would still be present, but ignored.
|
|
|
|
disable_2fa_remember: bool, true, def, false;
|
|
|
|
|
|
|
|
/// Reload templates (Dev) |> When this is set to true, the templates get reloaded with every request.
|
|
|
|
/// ONLY use this during development, as it can slow down the server
|
2019-02-05 22:17:02 +01:00
|
|
|
reload_templates: bool, true, def, false;
|
|
|
|
|
2019-02-13 00:03:16 +01:00
|
|
|
/// Log routes at launch (Dev)
|
|
|
|
log_mounts: bool, true, def, false;
|
2019-02-05 22:17:02 +01:00
|
|
|
/// Enable extended logging
|
|
|
|
extended_logging: bool, false, def, true;
|
2019-03-29 20:27:20 +01:00
|
|
|
/// Enable the log to output to Syslog
|
|
|
|
use_syslog: bool, false, def, false;
|
2019-02-05 22:17:02 +01:00
|
|
|
/// Log file path
|
|
|
|
log_file: String, false, option;
|
2019-03-25 14:12:41 +01:00
|
|
|
/// Log level
|
|
|
|
log_level: String, false, def, "Info".to_string();
|
2019-02-18 11:48:48 +01:00
|
|
|
|
2019-03-03 16:09:15 +01:00
|
|
|
/// Enable DB WAL |> Turning this off might lead to worse performance, but might help if using bitwarden_rs on some exotic filesystems,
|
|
|
|
/// that do not support WAL. Please make sure you read project wiki on the topic before changing this setting.
|
2019-02-18 11:48:48 +01:00
|
|
|
enable_db_wal: bool, false, def, true;
|
2019-02-20 21:44:35 +01:00
|
|
|
|
|
|
|
/// Disable Admin Token (Know the risks!) |> Disables the Admin Token for the admin page so you may use your own auth in-front
|
|
|
|
disable_admin_token: bool, true, def, false;
|
2019-02-05 22:17:02 +01:00
|
|
|
},
|
|
|
|
|
|
|
|
/// Yubikey settings
|
2019-02-06 00:38:57 +01:00
|
|
|
yubico: _enable_yubico {
|
|
|
|
/// Enabled
|
|
|
|
_enable_yubico: bool, true, def, true;
|
2019-02-05 22:17:02 +01:00
|
|
|
/// Client ID
|
|
|
|
yubico_client_id: String, true, option;
|
|
|
|
/// Secret Key
|
2019-02-08 20:49:04 +01:00
|
|
|
yubico_secret_key: Pass, true, option;
|
2019-02-05 22:17:02 +01:00
|
|
|
/// Server
|
|
|
|
yubico_server: String, true, option;
|
|
|
|
},
|
|
|
|
|
|
|
|
/// SMTP Email Settings
|
2019-02-06 00:38:57 +01:00
|
|
|
smtp: _enable_smtp {
|
|
|
|
/// Enabled
|
|
|
|
_enable_smtp: bool, true, def, true;
|
2019-02-05 22:17:02 +01:00
|
|
|
/// Host
|
|
|
|
smtp_host: String, true, option;
|
|
|
|
/// Enable SSL
|
|
|
|
smtp_ssl: bool, true, def, true;
|
2019-03-10 14:44:42 +01:00
|
|
|
/// Use explicit TLS |> Enabling this would force the use of an explicit TLS connection, instead of upgrading an insecure one with STARTTLS
|
|
|
|
smtp_explicit_tls: bool, true, def, false;
|
2019-02-05 22:17:02 +01:00
|
|
|
/// Port
|
2019-03-10 14:44:42 +01:00
|
|
|
smtp_port: u16, true, auto, |c| if c.smtp_explicit_tls {465} else if c.smtp_ssl {587} else {25};
|
2019-02-05 22:17:02 +01:00
|
|
|
/// From Address
|
|
|
|
smtp_from: String, true, def, String::new();
|
|
|
|
/// From Name
|
|
|
|
smtp_from_name: String, true, def, "Bitwarden_RS".to_string();
|
|
|
|
/// Username
|
|
|
|
smtp_username: String, true, option;
|
|
|
|
/// Password
|
2019-02-08 20:49:04 +01:00
|
|
|
smtp_password: Pass, true, option;
|
2019-02-05 22:17:02 +01:00
|
|
|
},
|
2019-02-02 01:09:21 +01:00
|
|
|
}
|
2019-01-25 18:23:51 +01:00
|
|
|
|
2019-02-02 16:47:27 +01:00
|
|
|
fn validate_config(cfg: &ConfigItems) -> Result<(), Error> {
|
2019-03-07 20:21:50 +01:00
|
|
|
if let Some(ref token) = cfg.admin_token {
|
|
|
|
if token.trim().is_empty() {
|
|
|
|
err!("`ADMIN_TOKEN` is enabled but has an empty value. To enable the admin page without token, use `DISABLE_ADMIN_TOKEN`")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-02 16:47:27 +01:00
|
|
|
if cfg.yubico_client_id.is_some() != cfg.yubico_secret_key.is_some() {
|
|
|
|
err!("Both `YUBICO_CLIENT_ID` and `YUBICO_SECRET_KEY` need to be set for Yubikey OTP support")
|
|
|
|
}
|
|
|
|
|
|
|
|
if cfg.smtp_host.is_some() == cfg.smtp_from.is_empty() {
|
|
|
|
err!("Both `SMTP_HOST` and `SMTP_FROM` need to be set for email support")
|
|
|
|
}
|
|
|
|
|
|
|
|
if cfg.smtp_username.is_some() != cfg.smtp_password.is_some() {
|
|
|
|
err!("Both `SMTP_USERNAME` and `SMTP_PASSWORD` need to be set to enable email authentication")
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2019-02-02 01:09:21 +01:00
|
|
|
impl Config {
|
2019-02-06 00:38:57 +01:00
|
|
|
pub fn load() -> Result<Self, Error> {
|
|
|
|
// Loading from env and file
|
|
|
|
let _env = ConfigBuilder::from_env();
|
|
|
|
let _usr = ConfigBuilder::from_file(&CONFIG_FILE).unwrap_or_default();
|
|
|
|
|
|
|
|
// Create merged config, config file overwrites env
|
|
|
|
let builder = _env.merge(&_usr);
|
|
|
|
|
|
|
|
// Fill any missing with defaults
|
|
|
|
let config = builder.build();
|
|
|
|
validate_config(&config)?;
|
|
|
|
|
|
|
|
Ok(Config {
|
|
|
|
inner: RwLock::new(Inner {
|
|
|
|
templates: load_templates(&config.templates_folder),
|
|
|
|
config,
|
|
|
|
_env,
|
|
|
|
_usr,
|
|
|
|
}),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-02-02 16:47:27 +01:00
|
|
|
pub fn update_config(&self, other: ConfigBuilder) -> Result<(), Error> {
|
2019-02-03 00:22:18 +01:00
|
|
|
// Remove default values
|
2019-02-06 00:38:57 +01:00
|
|
|
//let builder = other.remove(&self.inner.read().unwrap()._env);
|
|
|
|
|
|
|
|
// TODO: Remove values that are defaults, above only checks those set by env and not the defaults
|
|
|
|
let builder = other;
|
2019-02-02 16:47:27 +01:00
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
// Serialize now before we consume the builder
|
|
|
|
let config_str = serde_json::to_string_pretty(&builder)?;
|
2019-02-02 17:45:25 +01:00
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
// Prepare the combined config
|
|
|
|
let config = {
|
|
|
|
let env = &self.inner.read().unwrap()._env;
|
|
|
|
env.merge(&builder).build()
|
|
|
|
};
|
|
|
|
validate_config(&config)?;
|
|
|
|
|
|
|
|
// Save both the user and the combined config
|
|
|
|
{
|
|
|
|
let mut writer = self.inner.write().unwrap();
|
|
|
|
writer.config = config;
|
|
|
|
writer._usr = builder;
|
|
|
|
}
|
2019-02-02 16:47:27 +01:00
|
|
|
|
2019-02-02 17:45:25 +01:00
|
|
|
//Save to file
|
|
|
|
use std::{fs::File, io::Write};
|
2019-02-04 01:37:25 +01:00
|
|
|
let mut file = File::create(&*CONFIG_FILE)?;
|
2019-02-02 17:45:25 +01:00
|
|
|
file.write_all(config_str.as_bytes())?;
|
2019-02-02 16:47:27 +01:00
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2019-02-06 17:32:13 +01:00
|
|
|
pub fn delete_user_config(&self) -> Result<(), Error> {
|
|
|
|
crate::util::delete_file(&CONFIG_FILE)?;
|
|
|
|
|
|
|
|
// Empty user config
|
|
|
|
let usr = ConfigBuilder::default();
|
|
|
|
|
|
|
|
// Config now is env + defaults
|
|
|
|
let config = {
|
|
|
|
let env = &self.inner.read().unwrap()._env;
|
|
|
|
env.build()
|
|
|
|
};
|
|
|
|
|
|
|
|
// Save configs
|
|
|
|
{
|
|
|
|
let mut writer = self.inner.write().unwrap();
|
|
|
|
writer.config = config;
|
|
|
|
writer._usr = usr;
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
pub fn private_rsa_key(&self) -> String {
|
|
|
|
format!("{}.der", CONFIG.rsa_key_filename())
|
|
|
|
}
|
|
|
|
pub fn private_rsa_key_pem(&self) -> String {
|
|
|
|
format!("{}.pem", CONFIG.rsa_key_filename())
|
|
|
|
}
|
|
|
|
pub fn public_rsa_key(&self) -> String {
|
|
|
|
format!("{}.pub.der", CONFIG.rsa_key_filename())
|
|
|
|
}
|
2019-02-02 01:09:21 +01:00
|
|
|
pub fn mail_enabled(&self) -> bool {
|
2019-02-06 00:38:57 +01:00
|
|
|
let inner = &self.inner.read().unwrap().config;
|
2019-02-06 17:32:13 +01:00
|
|
|
inner._enable_smtp && inner.smtp_host.is_some()
|
2019-02-06 00:38:57 +01:00
|
|
|
}
|
|
|
|
pub fn yubico_enabled(&self) -> bool {
|
|
|
|
let inner = &self.inner.read().unwrap().config;
|
2019-02-06 17:32:13 +01:00
|
|
|
inner._enable_yubico && inner.yubico_client_id.is_some() && inner.yubico_secret_key.is_some()
|
2019-02-02 01:09:21 +01:00
|
|
|
}
|
2019-01-25 18:23:51 +01:00
|
|
|
|
2019-02-02 01:09:21 +01:00
|
|
|
pub fn render_template<T: serde::ser::Serialize>(
|
|
|
|
&self,
|
|
|
|
name: &str,
|
|
|
|
data: &T,
|
|
|
|
) -> Result<String, crate::error::Error> {
|
|
|
|
if CONFIG.reload_templates() {
|
|
|
|
warn!("RELOADING TEMPLATES");
|
|
|
|
let hb = load_templates(CONFIG.templates_folder().as_ref());
|
|
|
|
hb.render(name, data).map_err(Into::into)
|
|
|
|
} else {
|
|
|
|
let hb = &CONFIG.inner.read().unwrap().templates;
|
|
|
|
hb.render(name, data).map_err(Into::into)
|
|
|
|
}
|
|
|
|
}
|
2019-01-25 18:23:51 +01:00
|
|
|
}
|
|
|
|
|
2019-02-03 00:22:18 +01:00
|
|
|
use handlebars::{
|
|
|
|
Context, Handlebars, Helper, HelperDef, HelperResult, Output, RenderContext, RenderError, Renderable,
|
|
|
|
};
|
|
|
|
|
2019-01-25 18:23:51 +01:00
|
|
|
fn load_templates(path: &str) -> Handlebars {
|
|
|
|
let mut hb = Handlebars::new();
|
|
|
|
// Error on missing params
|
|
|
|
hb.set_strict_mode(true);
|
2019-02-17 15:22:27 +01:00
|
|
|
// Register helpers
|
2019-02-03 00:22:18 +01:00
|
|
|
hb.register_helper("case", Box::new(CaseHelper));
|
2019-02-17 15:22:27 +01:00
|
|
|
hb.register_helper("jsesc", Box::new(JsEscapeHelper));
|
2019-01-25 18:23:51 +01:00
|
|
|
|
|
|
|
macro_rules! reg {
|
|
|
|
($name:expr) => {{
|
|
|
|
let template = include_str!(concat!("static/templates/", $name, ".hbs"));
|
|
|
|
hb.register_template_string($name, template).unwrap();
|
|
|
|
}};
|
2019-02-10 19:12:34 +01:00
|
|
|
($name:expr, $ext:expr) => {{
|
|
|
|
reg!($name);
|
|
|
|
reg!(concat!($name, $ext));
|
|
|
|
}};
|
2019-01-25 18:23:51 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// First register default templates here
|
2019-02-10 19:12:34 +01:00
|
|
|
reg!("email/invite_accepted", ".html");
|
|
|
|
reg!("email/invite_confirmed", ".html");
|
|
|
|
reg!("email/pw_hint_none", ".html");
|
|
|
|
reg!("email/pw_hint_some", ".html");
|
|
|
|
reg!("email/send_org_invite", ".html");
|
2019-01-25 18:23:51 +01:00
|
|
|
|
|
|
|
reg!("admin/base");
|
|
|
|
reg!("admin/login");
|
|
|
|
reg!("admin/page");
|
|
|
|
|
|
|
|
// And then load user templates to overwrite the defaults
|
|
|
|
// Use .hbs extension for the files
|
|
|
|
// Templates get registered with their relative name
|
|
|
|
hb.register_templates_directory(".hbs", path).unwrap();
|
|
|
|
|
|
|
|
hb
|
|
|
|
}
|
2019-02-03 00:22:18 +01:00
|
|
|
|
|
|
|
pub struct CaseHelper;
|
|
|
|
|
|
|
|
impl HelperDef for CaseHelper {
|
|
|
|
fn call<'reg: 'rc, 'rc>(
|
|
|
|
&self,
|
|
|
|
h: &Helper<'reg, 'rc>,
|
|
|
|
r: &'reg Handlebars,
|
|
|
|
ctx: &Context,
|
|
|
|
rc: &mut RenderContext<'reg>,
|
|
|
|
out: &mut Output,
|
|
|
|
) -> HelperResult {
|
|
|
|
let param = h
|
|
|
|
.param(0)
|
|
|
|
.ok_or_else(|| RenderError::new("Param not found for helper \"case\""))?;
|
|
|
|
let value = param.value().clone();
|
|
|
|
|
|
|
|
if h.params().iter().skip(1).any(|x| x.value() == &value) {
|
|
|
|
h.template().map(|t| t.render(r, ctx, rc, out)).unwrap_or(Ok(()))
|
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-02-17 15:22:27 +01:00
|
|
|
|
|
|
|
pub struct JsEscapeHelper;
|
|
|
|
|
|
|
|
impl HelperDef for JsEscapeHelper {
|
|
|
|
fn call<'reg: 'rc, 'rc>(
|
|
|
|
&self,
|
|
|
|
h: &Helper<'reg, 'rc>,
|
|
|
|
_: &'reg Handlebars,
|
|
|
|
_: &Context,
|
|
|
|
_: &mut RenderContext<'reg>,
|
|
|
|
out: &mut Output,
|
|
|
|
) -> HelperResult {
|
|
|
|
let param = h
|
|
|
|
.param(0)
|
|
|
|
.ok_or_else(|| RenderError::new("Param not found for helper \"js_escape\""))?;
|
|
|
|
|
|
|
|
let value = param
|
|
|
|
.value()
|
|
|
|
.as_str()
|
|
|
|
.ok_or_else(|| RenderError::new("Param for helper \"js_escape\" is not a String"))?;
|
|
|
|
|
|
|
|
let escaped_value = value.replace('\\', "").replace('\'', "\\x22").replace('\"', "\\x27");
|
|
|
|
let quoted_value = format!(""{}"", escaped_value);
|
|
|
|
|
|
|
|
out.write("ed_value)?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|